A Comprehensive Look at Microsoft Defender for Endpoint. Defending with Style
October 18, 2023

A Comprehensive Look at Microsoft Defender for Endpoint. Defending with Style

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Microsoft Defender for Endpoint

Protecting the endpoints of our company, which include computers, laptops, and servers, is the main purpose of using Microsoft Defender for Endpoint in our organization. Our organization typically use MDE for Threat Detection. It keeps an eye out for indications of malicious or suspicious conduct on endpoints. It notifies the security team when it detects any threats.
  • Defender for Endpoint uses cutting-edge threat detection technologies, such as behavioral analysis and machine learning, to recognize and neutralize both known and undiscovered threats. Even the most complex and elusive malware and exploits can be found by it.
  • By providing threat analytics, it enables proactive threat prevention and mitigation by assisting organizations in understanding their security posture and trends over time.
  • It offers immediate insight into threat activity and endpoint security. Security teams can react quickly to threats since they can see what's happening across all of the devices in their organization.
  • For enterprises using the platform for the first time, the initial setup and configuration can be challenging. The experience might be enhanced by streamlining the onboarding procedure and offering more user-friendly setting wizards.
  • It might be difficult to afford, especially for smaller firms. The solution might be more widely available if it had a more open and flexible price structure, particularly for smaller enterprises.
  • Organizations could better address the escalating problems with cloud security with the help of enhanced functionality for monitoring and managing cloud apps and services.
  • By providing robust threat protection, Defender for Endpoint can prevent downtime caused by security issues. Employees can work without interruptions, leading to increased productivity.
  • By significantly decreasing the frequency of security incidents like malware infections and data breaches, Microsoft Defender for Endpoint can protect your network. The cost of incident response, cleanup, and potential regulatory fines are reduced as a result of the decrease in events.
  • The implementation and configuration of Microsoft Defender for Endpoint may require an initial investment in licensing, training, and deployment, which can temporarily affect ROI.
  • The cost of licensing can be substantial, especially for larger organizations. This cost needs to be factored into the ROI calculation.
  • Cloud Solutions
  • Scalability
  • Integration with Other Systems
Primarily, it's a cloud-native solution, leveraging the inherent Microsoft Defender within the Windows operating system. The process of connecting a device to the MDE portal is straightforward and uncomplicated. Additionally, unlike on-premises EDR solutions, it doesn't require a separate server to host the entire solution.
Endpoint Protection
Threat & Vulnerability Management
Intune Integration
Microsoft Defender Antivirus
Microsoft Defender SmartScreen
Attack Surface Reduction
100+ Endpoints both Windows OS & Windows server OS.
In my organization we already have E5 license so no need to procured additional license for EDR functionality.

Do you think Microsoft Defender for Endpoint delivers good value for the price?

Yes

Are you happy with Microsoft Defender for Endpoint's feature set?

Yes

Did Microsoft Defender for Endpoint live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Microsoft Defender for Endpoint go as expected?

Yes

Would you buy Microsoft Defender for Endpoint again?

Yes

It's ideal for protecting a variety of endpoints, including Windows-based PCs, servers, and mobile devices.
It's well-suited for organizations with a mix of on-premises and cloud resources.
Azure AD integration allows for seamless identity management in hybrid environments. While it supports hybrid environments, organizations with extremely complex on-premises setups may find it challenging to integrate.

Microsoft Defender for Endpoint Feature Ratings

Anti-Exploit Technology
9
Endpoint Detection and Response (EDR)
8
Centralized Management
10
Vulnerability Management
8
Malware Detection
9